Apache HTTP Server 2.2.24 Released

   The Apache Software Foundation and the Apache HTTP Server Project are
   pleased to announce the release of version 2.2.24 of the Apache HTTP
   Server ("Apache").  This version of Apache is principally a security
   and bug fix maintenance release, including the following significant
   security fixes:

   * SECURITY: CVE-2012-3499 (cve.mitre.org)
     Various XSS flaws due to unescaped hostnames and URIs HTML output in
     mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.

   * SECURITY: CVE-2012-4558 (cve.mitre.org)
     XSS in mod_proxy_balancer manager interface.

   We consider the Apache HTTP Server 2.4.4 release to be the best version
   of Apache available, and encourage users of 2.2 and all prior versions
   to upgrade.  This 2.2 maintenance release is offered for those unable
   to do so at this time.  For further details, see

     http://www.apache.org/dist/httpd/Announcement2.4.txt

   Apache HTTP Server 2.4.4 and 2.2.24 are available for download from:

     http://httpd.apache.org/download.cgi

   Please see the CHANGES_2.2 file, linked from the download page, for a
   full list of changes.  A condensed list, CHANGES_2.2.24 includes only
   those changes introduced since the prior 2.2 release.  A summary of all 
   of the security vulnerabilities addressed in this and earlier releases 
   is available:

     http://httpd.apache.org/security/vulnerabilities_22.html

   This release includes the Apache Portable Runtime (APR) version 1.4.6
   and APR Utility Library (APR-util) version 1.4.1, bundled with the tar
   and zip distributions.  The APR libraries libapr and libaprutil (and
   on Win32, libapriconv version 1.2.1) must all be updated to ensure
   binary compatibility and address many known security and platform bugs.
   APR-util version 1.4 represents a minor version upgrade from earlier
   httpd source distributions, which previously included version 1.3.

   This release builds on and extends the Apache 2.0 API and is superceeded
   by the Apache 2.4 API.  Modules written for Apache 2.0 or 2.4 will need
   to be recompiled in order to run with Apache 2.2, and most will require
   minimal or no source code changes.

   When upgrading or installing this version of Apache, please bear in mind
   that if you intend to use Apache with one of the threaded MPMs (other
   than the Prefork MPM), you must ensure that any modules you will be
   using (and the libraries they depend on) are thread-safe.



CVE-2012-4558

Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string. (CVSS:4.3) (Last Update:2014-01-17)

Software and Security Information